Threat Actors Hasten Ransomware Cyberattacks on Industrial Control Systems ICS
A Study Shows that Targeting ICS Networks in Operational Plants and Manufacturing Environments Bring Hackers a More Rapid Payment.
Ransomware attacks are moving forward quickly to target Industrial Control Systems (ICS) endpoints all over the world with a notable increase in activity in the past year.
The Trend Micro research paper, “2020 Report on Threats Affecting ICS Endpoints” calls attention to this dominant trend. The longer these systems are not operational, the more disruption it generates.
The report shows that recent ransomware attacks are just financially stimulated as attacking ICS networks in operational plants and manufacturing environments brings hackers a more rapid payment.
In terms of organizations that have ICSs that have been affected by ransomware, the US has the most ransomware detections impacting ICS, followed by India, Taiwan, and Spain, according to the report.
ICS Latest Ransomware Attacks
Multiple ransomware cyberattacks have been recently noticed targeting major businesses. Such disruption of Operation Systems and Industrial Control Systems (ICS) in major industries has caused grave consequences and loss of huge amounts of money.
On May 24th, WSSC Water has been hit with a ransomware attack where threat actors managed to access internal files but the water quality was not affected in any way.
In June, JBS Foods, the world’s largest meatpacking enterprise, declared that it paid an $11 million ransom to REvil ransomware threat actors following a cyberattack that forced the company to shut down production at several sites worldwide, affecting production facilities from United States, Australia, and Canada.
How to Defend ICSs Against Threats
In order to keep ICSs safe from threats, companies worldwide are required to regularly patch and update their systems.
Organizations can also execute micro-segmentation to increase security by limiting network access and communications to the necessary devices and protocols.
Adhering to the principle of least privilege, where employees are only given the exact level of access they need and nothing more, would also help minimize the chance of getting attacked or infected.